全文获取类型
收费全文 | 250篇 |
免费 | 8篇 |
专业分类
各国政治 | 12篇 |
工人农民 | 25篇 |
世界政治 | 17篇 |
外交国际关系 | 18篇 |
法律 | 130篇 |
中国政治 | 1篇 |
政治理论 | 53篇 |
综合类 | 2篇 |
出版年
2021年 | 4篇 |
2020年 | 10篇 |
2019年 | 7篇 |
2018年 | 14篇 |
2017年 | 13篇 |
2016年 | 7篇 |
2015年 | 9篇 |
2014年 | 3篇 |
2013年 | 36篇 |
2012年 | 7篇 |
2011年 | 12篇 |
2010年 | 6篇 |
2009年 | 6篇 |
2008年 | 3篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 3篇 |
2004年 | 7篇 |
2003年 | 8篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 6篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 8篇 |
1993年 | 4篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1980年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1973年 | 3篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有258条查询结果,搜索用时 15 毫秒
51.
Gabriela Kennedy 《Computer Law & Security Report》2011,27(2):201-210
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
52.
Previous work suggests that δ(18)O values of human hair can be used to constrain the region-of-origin of unknown individuals, but robust assessments of uncertainties in this method are lacking. Here we assess one source of uncertainty - temporal variation in the δ(18)O value of drinking water - using a monthly tap water survey of δ(18)O to develop geospatial models (i.e., maps) of the intra-annual variation (seasonality) in tap water δ(18)O for the contiguous USA. Temporal variation in tap water δ(18)O was correlated with water-supply type, and was related to geographic patterns of precipitation δ(18)O seasonality and water residence time. The maps were applied in a Bayesian framework to identify the geographic origin of an unidentified woman found in Utah, based on measured δ(18)O of scalp hair. The results are robust in specifying parts of the western USA as the most likely region-of-origin. Incorporation of tap water δ(18)O seasonality in the analysis reduces the precision of geographic assignments, but other sources of uncertainty (e.g., spatial interpolation uncertainty) have an equal or larger effect. 相似文献
53.
Joel M. Caplan Leslie W. Kennedy Gohar Petrossian 《Journal of Experimental Criminology》2011,7(3):255-274
We present a test of the crime-deterrent effect of police-monitored street-viewing CCTV cameras using viewsheds of areas that
were visible by cameras via direct line-of-sight and that were digitized using easily replicable methods, Google Maps, and
standard GIS tools. A quasi-experimental research design, using camera installation sites and randomly selected control sites,
assessed the impact of CCTV on the crimes of shootings, auto thefts, and thefts from autos in Newark, NJ, for 13 months before
and after camera installation dates. Strategically-placed cameras were not any different from randomly-placed cameras at deterring
crime within their viewsheds; there were statistically significant reductions in auto thefts within viewsheds after camera
installations; there were significant improvements to location quotient values for shootings and auto thefts after camera
installations. There was no significant displacement and there was a small diffusion of benefits, which was greater for auto
thefts than shootings. The system of cameras in Newark is not as efficient as it could be at deterring certain street crimes;
some camera locations are significantly more effective than others. Results of a system-wide evaluation of CCTV cameras should
not be the only basis for endorsing or contesting the use of CCTV cameras for crime control or prevention within a city. Future
research should test whether the effectiveness of CCTV cameras are dependent upon the micro-level attributes of environments
within which they are installed. 相似文献
54.
Kennedy Agade Mkutu 《Crime, Law and Social Change》2010,53(2):183-204
Insecurity with the use of small arms has become a disturbing theme in Kenya increasing over the past two decades. Rural areas
have seen escalating levels of armed inter-communal resource conflict, with rustling of large numbers of cattle and loss of
lives. Official security forces may be weak in such areas, or may be corrupt, demanding bribes to provide their services.
In such circumstances communities may resort to providing their own solutions, which have their merits and demerits. One such
homegrown solution has come out of Kuria. The Sungusungu are indigenous police, attached to a traditional Iritongo or court owned and funded by the community, and later hesitantly supported by the modern public administration. Their efforts
at managing armed criminality in the late 1990s were unexpectedly successful, bringing law and order and leading to a transformation
in the district. This article considers their successes and also notes real and potential problems with this concept of indigenous
policing, with regard to its wider application. 相似文献
55.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(1):178-185
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
56.
This article describes legal and human rights issues in three cases of transnational online offending involving extradition requests by the United States (US). These cases were selected as all suspects claimed the negative impacts of autism spectrum disorders (ASDs) were sufficient to deny extradition on human rights grounds. We demonstrate how recent developments in UK and Irish extradition law raise human rights and prosecutorial challenges specific to online offending that are not met by established protections under domestic and internationally sanctioned approaches to extradition or human rights law. In these cases, although the allegedly unlawful conduct occurred exclusively online and concurrent jurisdiction enables prosecution at both the source and location of harm, we demonstrate why national courts hearing extradition challenges are extremely reluctant to shift the trial forum. We conclude by discussing the implications of the new geographies of online offending for future criminological research and transnational criminal justice. 相似文献
57.
Gabriela Kennedy 《Computer Law & Security Report》2018,34(6):1364-1376
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
58.
59.
Democracy in Malawi is relatively new, due to the late introduction of a multiparty system in the mid‐1990s. Now it has all the systems in place but has been slow to make them effective. 相似文献
60.
Greg Kennedy 《Intelligence & National Security》2013,28(2):238-263
This article discusses the Royal Navy (RN)—Royal Air Force (RAF) feud concerning the use of air power in the round through an investigation of each service's appreciations of the lessons being learned about air power during the Spanish Civil War. It reveals that despite such bodies as the Joint Intelligence Committee existing, for the processing of operational and strategic intelligence, there was very little that was joint about the way air power lessons were being used to inform RN and RAF interwar preparations for future conflict. Not only were the RN and RAF rivals, which dragged out the process and skewed the results so that they became useless for planning, but in that non-joint age each service could use the results for its own separate purposes and avoid any synergy among the services for operational and strategic effectiveness. 相似文献